[Dev] Recommendations to avoid WebRTC leak in Iceweasel/Icecat

Megver83 megver83 at hyperbola.info
Wed Apr 15 04:12:41 GMT 2020

Hi everyone. As you may know, Iceweasel recently has enabled WebRTC by
default, and afaik Icecat already had it enabled. However, maybe not
everyone may use it in these times, or simply want to keep it disabled
to avoid the know IP leak, without having to change the
media.peerconnection.enabled option every time you're going to use Jitsi
or similar software, like me.

For that reason, I wanted to share an addon I've found which is like a
Swiss knife for privacy. It lets you enable/disable WebRTC (the main
reason I'm sharing it to you), override the user agent (and set a time
interval to periodically change it), spoof many things (among my
favorites, screen resolution spoofing, which is sth. that Tor Browser
does by default), and much more. I'm talking about Chameleon[0], maybe
some of you may know it, it's the WebExtension port of Random Agent Spoofer.

If you want to verify your IP is "leakable", check it here[1][2]

Hope this is useful to you!

[0] https://github.com/sereneblue/chameleon
[1] https://browserleaks.com/ip
[2] https://browserleaks.com/webrtc

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: OpenPGP digital signature
URL: <https://lists.parabola.nu/pipermail/dev/attachments/20200415/ef125698/attachment.sig>

More information about the Dev mailing list